Sciweavers

1783 search results - page 26 / 357
» Provenance and Data Synchronization
Sort
View
SIGSOFT
2008
ACM
14 years 8 months ago
Experience in using a process language to define scientific workflow and generate dataset provenance
This paper describes our experiences in exploring the applicability of software engineering approaches to scientific data management problems. Specifically, this paper describes h...
Leon J. Osterweil, Lori A. Clarke, Aaron M. Elliso...
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
IJIEM
2010
171views more  IJIEM 2010»
13 years 5 months ago
eConsent: provenance, use and future role
The use of information technology to manage patient consent is an important emerging area of research in health data management. This paper identifies literature, technological ad...
Sophie Cockcroft
SRDS
1994
IEEE
13 years 11 months ago
Probabilistic Internal Clock Synchronization
We propose an improved probabilistic method for reading remote clocks in systems subject to unbounded communication delays and use this method to design a family of fault-tolerant...
Flaviu Cristian, Christof Fetzer
ICPP
1998
IEEE
13 years 11 months ago
Minimizing Data and Synchronization Costs in One-Way Communication
In contrast to the conventional send/receive model, the one-way communication model--using Put and Synch--allows the decoupling of message transmission from synchronization. This ...
Mahmut T. Kandemir, U. Nagaraj Shenoy, Prithviraj ...